2021
DOI: 10.1155/2021/4079092
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Efficient Lightweight Vehicle Group Authentication Protocol in 5G Networks

Abstract: When mobile network enters 5G era, 5G networks have a series of unparalleled advantages. Therefore, the application of 5G network technology in the Internet of Vehicles (IoV) can promote more intelligently vehicular networks and more efficiently vehicular information transmission. However, with the combination of 5G networks and vehicular networks technology, it requires safe and reliable authentication and low computation overhead. Therefore, it is a challenge to achieve such low latency, security, and high m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 47 publications
0
18
0
Order By: Relevance
“…The combination of recognition algorithm based on deep learning and detection of transmission lines was the current research hotspot. Computer digital security was also a factor to be considered [23]. At present, the intelligent detection mainly relied on the UAV to carry cameras to obtain the information of power components, so as to find faults and feedback information in actual time.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The combination of recognition algorithm based on deep learning and detection of transmission lines was the current research hotspot. Computer digital security was also a factor to be considered [23]. At present, the intelligent detection mainly relied on the UAV to carry cameras to obtain the information of power components, so as to find faults and feedback information in actual time.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, several schemes such as [25]- [28] ignore the values of t x and t r due to their negligible execution time. Furthermore, the Chebyshev chaotic map is widely utilized in the VANET domain as it is proved to be appropriate for computationally limited devices [13], [20], [27]- [29].…”
Section: G Fast Response In Emergency Conditionsmentioning
confidence: 99%
“…• In [24], the Chebyshev chaotic map is defined to be more lightweight than the hash function. Furthermore, this map is frequently applied in the VANET authentication protocols [13], [20], [27]- [29] due to its lightweight computational properties.…”
Section: Formal Security Evaluation Using Scythermentioning
confidence: 99%
“…This can be a dangerous attack in an IoV environment. An attacker in the middle discreetly monitors, captures and effectively controls the communication between the two systems (Miao et al, 2021).…”
Section: Man-in-the-middle Attacksmentioning
confidence: 99%